<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>android malware Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/android-malware/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Thu, 21 Jun 2018 20:43:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>NEW! AIO Android Malware &#8211; MysteryBot</title>
		<link>https://www.osradar.com/new-aio-android-malware-mysterybot/</link>
					<comments>https://www.osradar.com/new-aio-android-malware-mysterybot/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Sun, 17 Jun 2018 05:39:26 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[android malware]]></category>
		<category><![CDATA[android trojan]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[mysterybot]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=4184</guid>

					<description><![CDATA[<p>Android is the most popular operating system for smart gadgets. It’s open-source and packs such a huge power that all the major smart gadget vendors now use Android as their operating system for their devices. That’s why hackers also like to target this platform more than ever. Recently, a new malware is discovered that packs [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/new-aio-android-malware-mysterybot/">NEW! AIO Android Malware &#8211; MysteryBot</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Android is the most popular operating system for smart gadgets. It’s open-source and packs such a huge power that all the major smart gadget vendors now use Android as their operating system for their devices. That’s why hackers also like to target this platform more than ever. Recently, a new malware is discovered that packs the power of 3 different malware types – Trojan, keylogger and a ransomware!</p>
<h2>The new malware – MysteryBot</h2>
<p>This new malware strain is still under development. However, it’s discovered recently by security researchers from ThreatFabric who happened to run across this new threat.</p>
<p>Security researchers said that the new malware seems to be related with the well-known malware strain LokiBot – a well-known Android banking Trojan.</p>
<p>According to the researchers of ThreatFabric, their code analysis of the new malware strain strongly suggests that there’re clear links between these two. It also clearly suggests that MysteryBot is based on LokiBot code.</p>
<p>Recent report on the new malware strain shows that the MysteryBot also communicates with the same C&amp;C server that LokiBot campaign used. This also suggests that both malware is the product of the same hacker(s) or group.</p>
<p>The reason behind the development of this new malware is unknown. However, it’s assumable that because the source code of LokiBot was leaked online, other cyber-criminal groups are already using the code. That’s why a new malware strain will more likely attract the underground market. However, according to the ThreatFabric security researchers, MysteryBot is not publicized in those forums as it’s still under development.</p>
<h2>MysteryBot operable on Android 7 and 8</h2>
<p>According to ThreatFabric, the new malware – MysteryBot is unique in many ways than other malware strains like LokiBot, Anubis II, CryEye, DiseaseBot etc.</p>
<p>For example, MysteryBot seems to be the first one that can reliably show “overlay screens” on Android 7 and 8. These overlay screens are efficient in stealing passwords on top of the legitimate apps. Because of security features, no malware ever succeeded in using a proper overlay screens on Android 7 (Nougat) and Android 8 (Oreo).</p>
<p>Now, MysteryBot is able to perfectly show the overlay screen on proper timing – when a user is using banking app. Thanks to the misuse of Android feature “Usage Access permission”, it indirectly leaks the information what app the user is currently using.</p>
<h2>Other components</h2>
<p>MysteryBot also comes up with other modules like the keylogger and a faulty ransomware module. Let’s talk about these two.</p>
<p>The keylogger is an advanced one – not available in the current Android market. Instead of taking screenshots what users are typing, this advanced keylogger directly captures the location of a touch gesture instead. Then, using the touch positions, the malware tries to guess the password string from the virtual keyboard. This module is still not active.</p>
<p>The faulty ransomware isn’t so well-coded. According to ThreatFabric, instead of encrypting files on the system, the module creates password-protected ZIP archives of those files. The password strength isn’t strong enough to protect the archives from brute-force attacks. Moreover, the passwords can easily be overwritten from the control panel when a new victim with the same ID syncs with the MysteryBot backend.</p>
<p><img loading="lazy" class="size-full wp-image-4185 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/06/mysterybot-control-panel.png" alt="" width="1497" height="683" srcset="https://www.osradar.com/wp-content/uploads/2018/06/mysterybot-control-panel.png 1497w, https://www.osradar.com/wp-content/uploads/2018/06/mysterybot-control-panel-300x137.png 300w, https://www.osradar.com/wp-content/uploads/2018/06/mysterybot-control-panel-768x350.png 768w, https://www.osradar.com/wp-content/uploads/2018/06/mysterybot-control-panel-1024x467.png 1024w, https://www.osradar.com/wp-content/uploads/2018/06/mysterybot-control-panel-696x318.png 696w, https://www.osradar.com/wp-content/uploads/2018/06/mysterybot-control-panel-1068x487.png 1068w, https://www.osradar.com/wp-content/uploads/2018/06/mysterybot-control-panel-921x420.png 921w" sizes="(max-width: 1497px) 100vw, 1497px" /></p>
<h2>How to stay secured</h2>
<p>There are lots of ways this malware can make into your phone. That’s why it’s strongly recommended that you don’t use apps from any unauthenticated sources, even from the Google Store. There are several apps in the wild that downloads several payloads from a server and if the dev wishes, the payloads are easy to swap with such powerful malware that can collect important information for them.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/new-aio-android-malware-mysterybot/">NEW! AIO Android Malware &#8211; MysteryBot</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/new-aio-android-malware-mysterybot/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Android Trojan Steals Info from Messenger, Skype, Twitter &#038; More</title>
		<link>https://www.osradar.com/android-trojan-steals-info-from-messenger-skype-twitter-more/</link>
					<comments>https://www.osradar.com/android-trojan-steals-info-from-messenger-skype-twitter-more/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Thu, 05 Apr 2018 04:38:59 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[android malware]]></category>
		<category><![CDATA[android trojan]]></category>
		<category><![CDATA[trojan]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=2403</guid>

					<description><![CDATA[<p>Android is the most popular operating system for smart devices. As Android is open-source, powerful yet flexible, smartphone manufacturers always choose it as their devices’ OS. Due to the immense popularity, hackers also target Android system for hacking. Recently, a new Android Trojan was identified that extracts information from other apps like Messenger, Twitter, Skype, [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/android-trojan-steals-info-from-messenger-skype-twitter-more/">Android Trojan Steals Info from Messenger, Skype, Twitter &amp; More</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Android is the most popular operating system for smart devices. As Android is open-source, powerful yet flexible, smartphone manufacturers always choose it as their devices’ OS. Due to the immense popularity, hackers also target Android system for hacking. Recently, a new Android Trojan was identified that extracts information from other apps like Messenger, Twitter, Skype, WeChat, Viber, Line etc.</p>
<p>According to security researchers from Trustlook, the Trojan is quite simple in design but uses an advanced method to hide from the system and other defenses.</p>
<h3>How the Android Trojan works</h3>
<p>The Trojan gains access to boot persistence and executes itself at every boot. At first, the malware unpacks the malicious code from the app’s resources. Then, it tries to modify a bash file at “/system/etc/install-recovery.sh”. If the modification is successful, it allows the malware to run at every boot.</p>
<p>Then, its task is to extract the data from the IM clients. The most popular ones are already mentioned above. The complete list of vulnerable IM clients can be found <a href="https://blog.trustlook.com/2018/04/02/a-trojan-with-hidden-malicious-code-steals-users-messenger-app-information/">here</a>. After collecting the information, the malware sends the data to a remote server. The server’s IP address is loaded from a pre-configured file.</p>
<p>This malware was identified inside a Chinese app named “Cloud Module” (in Chinese). The package was named “com.android.boxa”.</p>
<h3>Evasion techniques</h3>
<p>According to the researchers of Trustlook, despite simple workflow of the Android Trojan (running persistently, extracting info and uploading to remote server), it’s quite efficient in hiding itself. For example, it implements anti-emulator &amp; debugger detection that allows avoiding dynamic analysis. Moreover, it hides strings inside its source code for protection against thwart lackadaisical code reversing.</p>
<p>The method of workflow tells that the attacker is collecting personal information (chat, images or videos) for using later in extortion attempts or blackmailing from the high-profile victims. Researchers didn’t share any information how the malware spreads itself. However, as there’s no Play Store in China, the culprits are most likely spreading the malware via 3<sup>rd</sup>-party app stores and Android app forums.</p>
<p>There are also other attempts from Chinese vendors that shipped Android smartphones with built-in Trojan! <a href="https://www.osradar.com/pre-installed-malware-in-android/">Learn more about the pre-installed Trojan on the Android smartphones</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/android-trojan-steals-info-from-messenger-skype-twitter-more/">Android Trojan Steals Info from Messenger, Skype, Twitter &amp; More</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/android-trojan-steals-info-from-messenger-skype-twitter-more/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Android Malware – FakeBank (improved)</title>
		<link>https://www.osradar.com/new-android-malware-fakebank-improved/</link>
					<comments>https://www.osradar.com/new-android-malware-fakebank-improved/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Sat, 17 Mar 2018 13:42:43 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[android malware]]></category>
		<category><![CDATA[banking]]></category>
		<category><![CDATA[fakebank]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=2187</guid>

					<description><![CDATA[<p>Malware is the worst types of programs that are used to spy on others’ systems via illegal access. As Android is the most popular OS for smartphones, this platform is also the most appropriate one for hacking. FakeBank, an Android malware has been improved to work better at spying. It is a Trojan that overlays [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/new-android-malware-fakebank-improved/">New Android Malware – FakeBank (improved)</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Malware is the worst types of programs that are used to spy on others’ systems via illegal access. As Android is the most popular OS for smartphones, this platform is also the most appropriate one for hacking. FakeBank, an Android malware has been improved to work better at spying. It is a Trojan that overlays a fake login screen on the top of a legitimate banking app.</p>
<p>FakeBank is regarded one of the most creative malware for its working method. It whitelists its process so that it can run even on sleep mode. Additionally, it installed TeamViewer to give full access to remote users. With its new variation, it can intercept phone calls and redirect them to scammers.</p>
<h3>FakeBank (improved)</h3>
<p><img loading="lazy" class="aligncenter wp-image-2189 size-full" src="https://www.osradar.com/wp-content/uploads/2018/03/fake-bank-malware-android.jpg" alt="" width="700" height="379" srcset="https://www.osradar.com/wp-content/uploads/2018/03/fake-bank-malware-android.jpg 700w, https://www.osradar.com/wp-content/uploads/2018/03/fake-bank-malware-android-300x162.jpg 300w, https://www.osradar.com/wp-content/uploads/2018/03/fake-bank-malware-android-696x377.jpg 696w" sizes="(max-width: 700px) 100vw, 700px" /></p>
<p>FakeBank itself is an innovative one, but the new variation is quite unique on its own. The malware acts just like any other banking Trojan with the new ability. Whenever a user tries to contact with the bank’s phone number, it redirects the call to a scammer’s number. The scammer can easily collect the user’s sensitive information without knowing.</p>
<p>Moreover, the scammer can also call the infected device. The Trojan will show it as a call from the bank, allowing crooks perform their illegal acts without raising any suspicion.</p>
<h3>Active regions</h3>
<p>Currently, the new FakeBank variation was spotted in South Korea, according to the report of Symantec researchers. Experts found the Trojan injected into 22 apps that are being distributed by 3<sup>rd</sup>-party app stores. The links shared via social media are also infected. That’s why it’s the best to follow precautions before you get infected as well.</p>
<p>This indicates the weakest point of Android ecosystem – the app installation process. This is in the hand of the users to make sure that they are installing apps from trusted sources and what permissions they’re giving to these apps. The best practice is not to install apps from other sources and obtain them from Google Play Store only that provides a small scanning of all the apps.</p>
<p>Previously, we also saw such attacks that stole bank credentials from apps. <a href="https://www.osradar.com/man-middle-attack-banking-apps-stake/">Check out the infamous Man-in-the-Middle attack</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/new-android-malware-fakebank-improved/">New Android Malware – FakeBank (improved)</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/new-android-malware-fakebank-improved/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
